django-restit 4.2.164__py3-none-any.whl → 4.2.166__py3-none-any.whl

Sign up to get free protection for your applications and to get access to all the features.
account/models/device.py CHANGED
@@ -6,6 +6,8 @@ from rest import settings
6
6
  from objict import objict
7
7
  from datetime import datetime
8
8
 
9
+ from rest import helpers as rh
10
+
9
11
  CM_BACKENDS = objict()
10
12
  DEVICE_USE_BUID = settings.get("DEVICE_USE_BUID", False)
11
13
 
@@ -85,8 +87,9 @@ class MemberDevice(models.Model, rm.RestModel, rm.MetaDataModel):
85
87
  md.state = 1
86
88
  md.touch(request.ip)
87
89
  metadata = request.DATA.get("device_metadata", None)
88
- if isinstance(metadata, dict):
89
- md.set_metadata(metadata)
90
+ rh.debug("md.metadata", metadata)
91
+ if metadata is not None:
92
+ md.setProperty("device", metadata)
90
93
  return md
91
94
  md = MemberDevice(
92
95
  uuid=device_id, buid=buid,
@@ -100,8 +103,8 @@ class MemberDevice(models.Model, rm.RestModel, rm.MetaDataModel):
100
103
  md.save()
101
104
  md.setProperty("user_agent", request.META.get('HTTP_USER_AGENT', ''))
102
105
  metadata = request.DATA.get("device_metadata", None)
103
- if isinstance(metadata, dict):
104
- md.set_metadata(metadata)
106
+ if metadata is not None:
107
+ md.setProperty("device", metadata)
105
108
  return md
106
109
 
107
110
  @classmethod
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.1
2
2
  Name: django-restit
3
- Version: 4.2.164
3
+ Version: 4.2.166
4
4
  Summary: A Rest Framework for DJANGO
5
5
  License: MIT
6
6
  Author: Ian Starnes
@@ -26,7 +26,7 @@ account/migrations/0021_alter_cloudcredentials_group.py,sha256=zoFYmE-hd3uRGX6DR
26
26
  account/migrations/0022_alter_memberdevice_modified.py,sha256=9eeKcdr9p6qFJ8ZxSnKSj1KxZjW8NZfM0YCMck6i0QQ,424
27
27
  account/migrations/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
28
28
  account/models/__init__.py,sha256=cV_lMnT2vL_mjiYtT4hlcIHo52ocFbGSNVkOIHHLXZY,385
29
- account/models/device.py,sha256=2XT45W5iRGFFZlD5-nnypuR6BlscVbfsS1azxoeHj3Y,6222
29
+ account/models/device.py,sha256=8D-Sbv9PZWAnX6UVpp1lNJ03P24fknNnN1VOhqY7RVg,6306
30
30
  account/models/feeds.py,sha256=vI7fG4ASY1M0Zjke24RdnfDcuWeATl_yR_25jPmT64g,2011
31
31
  account/models/group.py,sha256=N9Ow7AtV4xN5zSE9E5-msthJy0G5-3DEr2MTmvFO1kU,22887
32
32
  account/models/legacy.py,sha256=zYdtv4LC0ooxPVqWM-uToPwV-lYWQLorSE6p6yn1xDw,2720
@@ -95,7 +95,7 @@ inbox/utils/parsing.py,sha256=y_71dwz8bm3JvF35ol8698XJ36sBF8fQWUrn0sYd2Fs,5597
95
95
  inbox/utils/render.py,sha256=CU_F2qUBQE7mjb9Q6Dn9ro5CS_O_zEY-wDMHEClKkIA,4331
96
96
  inbox/utils/sending.py,sha256=BKelTZnbkdSLGpjOY6IRTrzj-Hnw2pPZ7RYQGwe-tqk,2179
97
97
  incident/README.md,sha256=4vbZTJj7uUmq8rogYngxqNYjFTlBOujfWUGheLoFKMc,1114
98
- incident/__init__.py,sha256=xgdt3z3z7ygjWv5HxhiWgBtB2W3IUJmmR88NSyUeHuo,3455
98
+ incident/__init__.py,sha256=FXNMmcGP6YAKjwik84ppze33uL0kDTa7YFr3aOEXhhk,3658
99
99
  incident/migrations/0001_initial.py,sha256=KmJRau3a2QFRaUwUrFUgY2p7FQZCODv3F-Sl0ZArpu0,9720
100
100
  incident/migrations/0002_event_component_event_component_id.py,sha256=Qfu3ndJKh4v7953ULTUZlSa3mVI-lnFIq9VFN1Rbs7Q,595
101
101
  incident/migrations/0003_rule_action.py,sha256=LNqV52qOjxxe3L8qEdln-Hd2voFcpyjOZ_cEsasrv7s,425
@@ -111,17 +111,18 @@ incident/migrations/0012_rule_match_by.py,sha256=PGclGnnc_8JEsJZ8znoXm-iAC6Y0i2W
111
111
  incident/migrations/0013_rulecheck_is_required.py,sha256=cL7tOj5XGPpKd2f5BojIKfNJeDB1IL-jGRU6-g-Co5o,387
112
112
  incident/migrations/0014_event_group_alter_rulecheck_index.py,sha256=v3gm5k0LVoas27qUDOt7el7YtK4yjFVLeEpuFUCoXaQ,724
113
113
  incident/migrations/0015_rule_title_template_alter_incident_state.py,sha256=FPUDhFwqBC39EjeknRT7BPddEf6ExCjsXVb9LMqIn3U,687
114
+ incident/migrations/0016_rule_notify_template.py,sha256=4WGdMxiELujLIy9bzHovHWbAORupodN1Ty3vsy3mLjg,425
114
115
  incident/migrations/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
115
116
  incident/models/__init__.py,sha256=NMphuhb0RTMf7Ov4QkNv7iv6_I8Wtr3xQ54yjX_a31M,209
116
117
  incident/models/event.py,sha256=FEzEKKQKLkdRrPCvv-3Um9E2UPQjyIJp314Zr2LHuiw,7976
117
- incident/models/incident.py,sha256=5unJbVcjK05moXPrmq4S9aqGW6ysIzRxD4lp_HowKLs,21940
118
+ incident/models/incident.py,sha256=dSveWs0VawYePeFxwZT8ni85CS_4jxpGV8nXPVGXokk,22607
118
119
  incident/models/ossec.py,sha256=eUDRGawzuLWobKEVGKfdZisDnyjS_Hlxi0T_GCSLCCI,2252
119
- incident/models/rules.py,sha256=aRkJ0ZnTv87nAUC1sHVkPExfb3OJ8fgHQIhnCIpIbhQ,7001
120
+ incident/models/rules.py,sha256=PPp8oJDW1gop9i_21lhP50qgt_TrdWErp2mYqZCMfd4,7065
120
121
  incident/models/ticket.py,sha256=S3kqGQpYLE6Y4M9IKu_60sgW-f592xNr8uufqHnvDoU,2302
121
122
  incident/parsers/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
122
123
  incident/parsers/ossec.py,sha256=fouUsSnrdkEuqDzJ-MxmCP7ny5pCGFS3Tyf6lQSMBc4,11609
123
124
  incident/periodic.py,sha256=eX1rQK6v65A9ugofTvJPSmAWei6C-3EYgzCMuGZ03jM,381
124
- incident/rpc.py,sha256=sFHN1BTTPx-yYd6iCOpcGsKVHZPcD7LWcRcR0XsVquE,8768
125
+ incident/rpc.py,sha256=y1u_op8PiWI4kUVD_DsKXmygdxRDBDxudCFGp829s3E,9056
125
126
  incident/templates/email/incident_change.html,sha256=tQYphypwLukkVdwH0TB2Szz2VEJ7GnsfRS3_ZJ-MYeE,13895
126
127
  incident/templates/email/incident_msg.html,sha256=MZdKhTddUF2MpiH8Z3RTQEmW_ko1n3ajeZ11KLtiLlU,13780
127
128
  incident/templates/email/incident_new.html,sha256=W6nwFQROnyDfMlXub8s02ws4hGnJp16pfgp9xTm_aEc,15185
@@ -378,7 +379,7 @@ pushit/utils.py,sha256=IeTCGa-164nmB1jIsK1lu1O1QzUhS3BKfuXHGjCW-ck,2121
378
379
  rest/.gitignore,sha256=TbEvWRMnAiajCTOdhiNrd9eeCAaIjRp9PRjE_VkMM5g,118
379
380
  rest/README.md,sha256=V3ETc-cJu8PZIbKr9xSe_pA4JEUpC8Dhw4bQeVCDJPw,5460
380
381
  rest/RemoteEvents.py,sha256=nL46U7AuxIrlw2JunphR1tsXyqi-ep_gD9CYGpYbNgE,72
381
- rest/__init__.py,sha256=OHP0LpCorLpmS0bdBI3QI-eOYtwdkh6DTH6YgR3KOUg,122
382
+ rest/__init__.py,sha256=0TxtckfR2izNmII4ddcJuIksqIVi3UW_LKZ9O-p_E4E,122
382
383
  rest/arc4.py,sha256=y644IbF1ec--e4cUJ3KEYsewTCITK0gmlwa5mJruFC0,1967
383
384
  rest/cache.py,sha256=1Qg0rkaCJCaVP0-l5hZg2CIblTdeBSlj_0fP6vlKUpU,83
384
385
  rest/crypto/__init__.py,sha256=Tl0U11rgj1eBYqd6OXJ2_XSdNLumW_JkBZnaJqI6Ldw,72
@@ -514,7 +515,7 @@ ws4redis/servers/uwsgi.py,sha256=VyhoCI1DnVFqBiJYHoxqn5Idlf6uJPHvfBKgkjs34mo,172
514
515
  ws4redis/settings.py,sha256=KKq00EwoGnz1yLwCZr5Dfoq2izivmAdsNEEM4EhZwN4,1610
515
516
  ws4redis/utf8validator.py,sha256=S0OlfjeGRP75aO6CzZsF4oTjRQAgR17OWE9rgZdMBZA,5122
516
517
  ws4redis/websocket.py,sha256=R0TUyPsoVRD7Y_oU7w2I6NL4fPwiz5Vl94-fUkZgLHA,14848
517
- django_restit-4.2.164.dist-info/LICENSE.md,sha256=VHN4hhEeVOoFjtG-5fVv4jesA4SWi0Z-KgOzzN6a1ps,1068
518
- django_restit-4.2.164.dist-info/METADATA,sha256=cxD7mymamfcjCPYJNAbJ6Kkk9WMB_sHtqPA7wN8KPo8,7663
519
- django_restit-4.2.164.dist-info/WHEEL,sha256=sP946D7jFCHeNz5Iq4fL4Lu-PrWrFsgfLXbbkciIZwg,88
520
- django_restit-4.2.164.dist-info/RECORD,,
518
+ django_restit-4.2.166.dist-info/LICENSE.md,sha256=VHN4hhEeVOoFjtG-5fVv4jesA4SWi0Z-KgOzzN6a1ps,1068
519
+ django_restit-4.2.166.dist-info/METADATA,sha256=UFrfXKJj92wJ-lgCMNHKLGE8dsK9hP9MKncpiq9O-jE,7663
520
+ django_restit-4.2.166.dist-info/WHEEL,sha256=sP946D7jFCHeNz5Iq4fL4Lu-PrWrFsgfLXbbkciIZwg,88
521
+ django_restit-4.2.166.dist-info/RECORD,,
incident/__init__.py CHANGED
@@ -15,6 +15,9 @@ def _request_to_meta(request, metadata):
15
15
  metadata["buid"] = request.buid
16
16
  if "username" not in metadata and hasattr(request, "member") and request.member is not None:
17
17
  metadata["username"] = request.member.username
18
+ # if "group_name" not in metadata and hasattr(request, "group") and request.group is not None:
19
+ # metadata['group_name'] = request.group.name
20
+ # metadata['group_id'] = request.group.id
18
21
  return metadata
19
22
 
20
23
 
@@ -0,0 +1,18 @@
1
+ # Generated by Django 4.2.11 on 2025-01-03 19:20
2
+
3
+ from django.db import migrations, models
4
+
5
+
6
+ class Migration(migrations.Migration):
7
+
8
+ dependencies = [
9
+ ('incident', '0015_rule_title_template_alter_incident_state'),
10
+ ]
11
+
12
+ operations = [
13
+ migrations.AddField(
14
+ model_name='rule',
15
+ name='notify_template',
16
+ field=models.TextField(default=None, null=True),
17
+ ),
18
+ ]
@@ -280,9 +280,7 @@ class Incident(models.Model, rm.RestModel, rm.MetaDataModel):
280
280
  try:
281
281
  action, perm = self.rule.action.split(":")
282
282
  members = Member.GetWithNotification(perm)
283
- # count = self.getProperty("event_count", default=1, field_type=int)
284
- url = F"{settings.INCIDENT_PORTAL_URL}?incident={self.pk}"
285
- msg = f"Incident #{self.pk}\n{self.description}\n{url}"
283
+ msg = self.renderTemplate()
286
284
  for m in members:
287
285
  m.sendSMS(msg)
288
286
  except Exception:
@@ -363,6 +361,29 @@ class Incident(models.Model, rm.RestModel, rm.MetaDataModel):
363
361
  context=dict(incident=self, portal_url=settings.INCIDENT_PORTAL_URL),
364
362
  email_only=True, from_email=INCIDENT_EMAIL_FROM)
365
363
 
364
+ def renderTemplate(self):
365
+ has_template = self.rule and self.rule.notify_template and not self.rule.notify_template.startswith("http")
366
+ url = self.renderURL()
367
+ if not has_template:
368
+ return f"Incident #{self.pk}\n{self.description}\n{url}"
369
+ template = self.rule.notify_template
370
+ try:
371
+ template = template.format(event=self)
372
+ except Exception:
373
+ pass
374
+ return template
375
+
376
+ def renderURL(self):
377
+ has_template = self.rule and self.rule.notify_template and self.rule.notify_template.startswith("http")
378
+ if not has_template:
379
+ return F"{settings.INCIDENT_PORTAL_URL}?incident={self.pk}"
380
+ url = self.rule.notify_template
381
+ try:
382
+ url = url.format(event=self)
383
+ except Exception:
384
+ pass
385
+ return url
386
+
366
387
  def lastSentAge(self):
367
388
  # prevent spams, only allow emails every 5 minutes
368
389
  if self.action_sent is None:
incident/models/rules.py CHANGED
@@ -65,6 +65,7 @@ class Rule(models.Model, rm.RestModel):
65
65
 
66
66
  name = models.CharField(max_length=200)
67
67
  title_template = models.CharField(max_length=200, default=None, null=True)
68
+ notify_template = models.TextField(default=None, null=True)
68
69
  # the group the rule gets assigned to when triggered
69
70
  group = models.ForeignKey("account.Group", on_delete=models.CASCADE, null=True, default=None)
70
71
  # category allows us to limit running rules to only those with a category
incident/rpc.py CHANGED
@@ -56,69 +56,85 @@ if settings.REPORT_PERMISSION_DENIED:
56
56
  rv.restPermissionDenied = patched_restPermissionDenied
57
57
 
58
58
 
59
+ @rd.urlPOST(r'^ossec/alert/batch$')
60
+ def batch_ossec_alert_creat_from_request(request):
61
+ batch = request.DATA.get("batch")
62
+ if not isinstance(batch, list):
63
+ return rv.restStatus(request, False, error="invalid format")
64
+ for alert in batch:
65
+ on_ossec_alert(request, alert)
66
+ return rv.restStatus(request, True)
67
+
68
+
59
69
  @rd.urlPOST(r'^ossec/alert$')
60
70
  def ossec_alert_creat_from_request(request):
61
71
  payload = request.DATA.get("payload")
62
- if payload:
63
- try:
64
- # TODO make this a task (background it)
65
- # rh.log_error("parsing payload", payload)
66
- od = ossec.parseAlert(request, payload)
67
- # lets now create a local event
68
- if od is not None:
69
- level = 10
70
- if od.level > 10:
71
- level = 1
72
- elif od.level > 7:
73
- level = 2
74
- elif od.level == 6:
75
- level = 3
76
- elif od.level == 5:
77
- level = 4
78
- elif od.level == 4:
79
- level = 6
80
- elif od.level <= 3:
81
- level = 8
82
- metadata = od.toDict(graph="default")
83
- metadata.update(od.metadata)
84
- # we reuse the ssh_sig because it is a text field to store urls
85
- # ssh_sig = metadata.get("ssh_sig", None)
86
- # if ssh_sig is not None and ssh_sig.startswith("http"):
87
- # metadata["url"] = ssh_sig
88
- # metadata["domain"] = ossec.extractDomain(ssh_sig)
89
- # metadata["path"] = ossec.extractUrlPath(ssh_sig)
90
- # metadata.pop("ssh_sig")
91
- if od.geoip:
92
- metadata["country"] = od.geoip.country
93
- metadata["city"] = od.geoip.city
94
- metadata["province"] = od.geoip.state
95
- metadata["isp"] = od.geoip.isp
96
-
97
- am.Event.createFromDict(None, {
98
- "hostname": od.hostname,
99
- "description": od.title,
100
- "details": od.text,
101
- "level": level,
102
- "category": "ossec",
103
- "component": "incident.ServerOssecAlert",
104
- "component_id": od.id,
105
- "reporter_ip": od.src_ip,
106
- "metadata": metadata
107
- })
108
- return rv.restStatus(request, True)
109
- except Exception as err:
110
- rh.log_exception()
111
- stack = rh.getStackString()
112
- # rh.log_exception("during ossec alert", payload)
113
- metadata = dict(ip=request.ip, payload=payload)
72
+ if not payload:
73
+ return rv.restStatus(request, False, error="no alert data")
74
+ on_ossec_alert(request, payload)
75
+ return rv.restStatus(request, True)
76
+
77
+
78
+ def on_ossec_alert(request, alert):
79
+ try:
80
+ # TODO make this a task (background it)
81
+ # rh.log_error("parsing payload", payload)
82
+ od = ossec.parseAlert(request, alert)
83
+ # lets now create a local event
84
+ if od is not None:
85
+ level = 10
86
+ if od.level > 10:
87
+ level = 1
88
+ elif od.level > 7:
89
+ level = 2
90
+ elif od.level == 6:
91
+ level = 3
92
+ elif od.level == 5:
93
+ level = 4
94
+ elif od.level == 4:
95
+ level = 6
96
+ elif od.level <= 3:
97
+ level = 8
98
+ metadata = od.toDict(graph="default")
99
+ metadata.update(od.metadata)
100
+ # we reuse the ssh_sig because it is a text field to store urls
101
+ # ssh_sig = metadata.get("ssh_sig", None)
102
+ # if ssh_sig is not None and ssh_sig.startswith("http"):
103
+ # metadata["url"] = ssh_sig
104
+ # metadata["domain"] = ossec.extractDomain(ssh_sig)
105
+ # metadata["path"] = ossec.extractUrlPath(ssh_sig)
106
+ # metadata.pop("ssh_sig")
107
+ if od.geoip:
108
+ metadata["country"] = od.geoip.country
109
+ metadata["city"] = od.geoip.city
110
+ metadata["province"] = od.geoip.state
111
+ metadata["isp"] = od.geoip.isp
112
+
114
113
  am.Event.createFromDict(None, {
115
- "hostname": request.get_host(),
116
- "description": f"error parseing alert: {err}",
117
- "details": stack,
118
- "level": 8,
119
- "category": "ossec_error",
114
+ "hostname": od.hostname,
115
+ "description": od.title,
116
+ "details": od.text,
117
+ "level": level,
118
+ "category": "ossec",
119
+ "component": "incident.ServerOssecAlert",
120
+ "component_id": od.id,
121
+ "reporter_ip": od.src_ip,
120
122
  "metadata": metadata
121
123
  })
124
+ return rv.restStatus(request, True)
125
+ except Exception as err:
126
+ rh.log_exception()
127
+ stack = rh.getStackString()
128
+ # rh.log_exception("during ossec alert", payload)
129
+ metadata = dict(ip=request.ip, payload=alert)
130
+ am.Event.createFromDict(None, {
131
+ "hostname": request.get_host(),
132
+ "description": f"error parseing alert: {err}",
133
+ "details": stack,
134
+ "level": 8,
135
+ "category": "ossec_error",
136
+ "metadata": metadata
137
+ })
122
138
  # rh.log_error("ossec alert", request.DATA.asDict())
123
139
  return rv.restStatus(request, False, error="no alert data")
124
140
 
rest/__init__.py CHANGED
@@ -1,4 +1,4 @@
1
1
  from .uberdict import UberDict # noqa: F401
2
2
  from .settings_helper import settings # noqa: F401
3
3
 
4
- __version__ = "4.2.164"
4
+ __version__ = "4.2.166"